| Peer-Reviewed

Hybridized Cryptography and Cloud Folder Model (CFM) for Secure Cloud-Based Storage

Received: 3 August 2022    Accepted: 27 August 2022    Published: 27 September 2022
Views:       Downloads:
Abstract

Information security is the number one priority for any establishment concerned with its growth and privacy of its data. Attackers have devised a variety of strategies to get access to organizations' databases, both on cloud and offline systems. The incorporation of both cryptography and cloud folder model to secure cloud based storage presented in this paper, is a contemporary approach to securing cloud storage. The Cloud Folder Model adds to the storage strength. It serves as a significant deterrent against eavesdropping and injection assaults on the cloud storage. The model leverages RSA and AES data encryption, as well as a folder concept for storing the files in the cloud. It only enables authorized entities to have access to data and rejects suspicions and fraudulent attempts to access secured data. The system also created a mechanism that utilizes public and private keys. The system is be divided into two sections: online and offline. Data is encrypted using RSA and the Advanced Encryption Standard on the offline side (AES) while the online system adds to the encrypted data's security by guarding against injection attacks and data eavesdropping in transit. Our result shows that the new system provides better security for cloud storage than the existing system.

Published in American Journal of Computer Science and Technology (Volume 5, Issue 3)
DOI 10.11648/j.ajcst.20220503.14
Page(s) 178-183
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2024. Published by Science Publishing Group

Keywords

Cryptography, Cloud Storage, Data Security, Cloud Folder

References
[1] Abubakar M., Aloysius A., Umar Z. & Dauda M., (2019). Comparative Analysis of Some Efficient Data Security Methods among Cryptographic Techniques for Cloud Data Security, Nigerian Journal of Basic and Applied Science, 27, (1), 81-88.
[2] Ahmad I., Bakht H. & Mohan U., (2017). Cloud Computing - A Comprehensive Definition. Journal of Computing and Management Studies. 1.
[3] Aman, S., Shivashankar, R., Ginni, and Advin, M. (2021). Securing File Storage on the Cloud using Cryptography. International Journal of Advanced Research in Computer and Communication Engineering. 10 (4), 265-268.
[4] Chang X., Li W., Yan A., Tsang P., & Poon T. (2022). Asymmetric cryptosystem based on optical scanning cryptography and elliptic curve algorithm. Scientific Reports. 7 (12). https://doi.org/10.1038/s41598-022-11861/
[5] Ghamya K., Suma K., & Bhargavi V., (2019). An Authorized ClouDedup in Hybrid Cloud using Triple Data Encryption Standard, International Journal of Recent Technology and Engineering (IJRTE), 8 (4), 9803-9807.
[6] Muhammad P., Sijjad A., Ghazala P. & Kamran A., (2019). SACA: A Study of Symmetric and Asymmetric Cryptographic Algorithms. International Journal of Computer Science and Network Security (IJCSNS), 19 (1).
[7] Muhammad R., Quazi M. & Rafiqul I., (2022). Lightweight cryptography in IoT networks: A survey, Future Generation Computer Systems, v129, p 77-89, ISSN 0167-739X, https://doi.org/10.1016/ j.future.2021.11.011
[8] Muhned H., Ghassan H. & Haider K., (2021). New Lightweight Hybrid Encryption Algorithm for Cloud Computing (LMGHA-128bit) by using new 5-D hyperchaos system, Turkish Journal of Computer and Mathematics Education, 12 (10), 2531-2540.
[9] Nidhi, K and Vimmi, M (2022). Secure Cloud Data storage using Hybrid Cryptography. International Journal for Research in Applied Science and Engineering Technology. 10 (4), 50-63.
[10] Pandey & Bathla, (2020). A Secure And Managed Cloud Storage System Using Encryption With Machine Learning Approach, International Journal of Science and Technology, 6, (3), 87-101.
[11] Priya (2018). Information Security And Privacy In Cloud Using Hybrid Cryptographic Algorithm, International Journal of Engineering Applied Sciences and Technology, 3, (4), 49-53.
[12] Rahul Neware, (2019). Survey on Security Issues in Mobile Cloud Computing and Preventive Measures, Smart Computing Paradigms: New Progresses and Challenges.
[13] Shynu P., Nadesh R., Varun G., Venu P., Mahdi A. & Mohammad R., (2020). A Secure Data Deduplication System For Integrated Cloud-Edge Networks, Journal of Cloud Computing: Advances, Systems and Applications, 9 (6), 100-109.
[14] Sofia, M. V Joann, D, Kerry, M, Shun, R… Ozonot, A.(2020). A Cloud based Bio-informatics Analytic infrastructure and Data Management Core for the Expanded Program on Immunization Consortium. DMC Journal. 6 (7), 104-110.
[15] Sood, S., (2021). A combined approach to ensure data security in cloud computing, Journal of Networking and Computer Application, 3 (5), 1831–1838.
[16] Sumagna, P., Sunil, A., and Rakesh, R. (2021). Hybrid cryptography algorithm for secure file Storage in the cloud. A Journal of Composition Theory. 9 (10), 25-28.
[17] Sunyaev A., (2020). Cloud Computing. In: Internet Computing. Springer, Cham. https://doi.org/10.1007/978-3-030-34957-8_7.
[18] Supern, S (2011). Cloud Security in 21st Century: Current Key issues in Service Models on Cloud Computing. University of Nottingham.
[19] Vasileios, A. M and Kostas, E P (2014). A New Methodology based on Cloud Computing for Efficient Virus Detection. IEEE Conference.
[20] Vincent C., Michaela I., Wei B., Ang L., Qinghua L., Antonios, G., (2020). National Institute of Standards and Technology, https://doi.org/10.6028/NIST.SP.800-210 Vttam, K and Jay, P.(2020). Secure File Storage on Cloud using Hybrid Cryptography Algorithm. International Journal of creative thoughts. 8 (7), 334-341.
[21] Youseff L., Butrico M., & Da Silva D., (2008). “Toward a Unified Ontology of Cloud Computing”, IEEE, 1–10.
Cite This Article
  • APA Style

    Anietie Ekong, Odikwa Henry, Abasiama Silas, Imou Douglas. (2022). Hybridized Cryptography and Cloud Folder Model (CFM) for Secure Cloud-Based Storage. American Journal of Computer Science and Technology, 5(3), 178-183. https://doi.org/10.11648/j.ajcst.20220503.14

    Copy | Download

    ACS Style

    Anietie Ekong; Odikwa Henry; Abasiama Silas; Imou Douglas. Hybridized Cryptography and Cloud Folder Model (CFM) for Secure Cloud-Based Storage. Am. J. Comput. Sci. Technol. 2022, 5(3), 178-183. doi: 10.11648/j.ajcst.20220503.14

    Copy | Download

    AMA Style

    Anietie Ekong, Odikwa Henry, Abasiama Silas, Imou Douglas. Hybridized Cryptography and Cloud Folder Model (CFM) for Secure Cloud-Based Storage. Am J Comput Sci Technol. 2022;5(3):178-183. doi: 10.11648/j.ajcst.20220503.14

    Copy | Download

  • @article{10.11648/j.ajcst.20220503.14,
      author = {Anietie Ekong and Odikwa Henry and Abasiama Silas and Imou Douglas},
      title = {Hybridized Cryptography and Cloud Folder Model (CFM) for Secure Cloud-Based Storage},
      journal = {American Journal of Computer Science and Technology},
      volume = {5},
      number = {3},
      pages = {178-183},
      doi = {10.11648/j.ajcst.20220503.14},
      url = {https://doi.org/10.11648/j.ajcst.20220503.14},
      eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.ajcst.20220503.14},
      abstract = {Information security is the number one priority for any establishment concerned with its growth and privacy of its data. Attackers have devised a variety of strategies to get access to organizations' databases, both on cloud and offline systems. The incorporation of both cryptography and cloud folder model to secure cloud based storage presented in this paper, is a contemporary approach to securing cloud storage. The Cloud Folder Model adds to the storage strength. It serves as a significant deterrent against eavesdropping and injection assaults on the cloud storage. The model leverages RSA and AES data encryption, as well as a folder concept for storing the files in the cloud. It only enables authorized entities to have access to data and rejects suspicions and fraudulent attempts to access secured data. The system also created a mechanism that utilizes public and private keys. The system is be divided into two sections: online and offline. Data is encrypted using RSA and the Advanced Encryption Standard on the offline side (AES) while the online system adds to the encrypted data's security by guarding against injection attacks and data eavesdropping in transit. Our result shows that the new system provides better security for cloud storage than the existing system.},
     year = {2022}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - Hybridized Cryptography and Cloud Folder Model (CFM) for Secure Cloud-Based Storage
    AU  - Anietie Ekong
    AU  - Odikwa Henry
    AU  - Abasiama Silas
    AU  - Imou Douglas
    Y1  - 2022/09/27
    PY  - 2022
    N1  - https://doi.org/10.11648/j.ajcst.20220503.14
    DO  - 10.11648/j.ajcst.20220503.14
    T2  - American Journal of Computer Science and Technology
    JF  - American Journal of Computer Science and Technology
    JO  - American Journal of Computer Science and Technology
    SP  - 178
    EP  - 183
    PB  - Science Publishing Group
    SN  - 2640-012X
    UR  - https://doi.org/10.11648/j.ajcst.20220503.14
    AB  - Information security is the number one priority for any establishment concerned with its growth and privacy of its data. Attackers have devised a variety of strategies to get access to organizations' databases, both on cloud and offline systems. The incorporation of both cryptography and cloud folder model to secure cloud based storage presented in this paper, is a contemporary approach to securing cloud storage. The Cloud Folder Model adds to the storage strength. It serves as a significant deterrent against eavesdropping and injection assaults on the cloud storage. The model leverages RSA and AES data encryption, as well as a folder concept for storing the files in the cloud. It only enables authorized entities to have access to data and rejects suspicions and fraudulent attempts to access secured data. The system also created a mechanism that utilizes public and private keys. The system is be divided into two sections: online and offline. Data is encrypted using RSA and the Advanced Encryption Standard on the offline side (AES) while the online system adds to the encrypted data's security by guarding against injection attacks and data eavesdropping in transit. Our result shows that the new system provides better security for cloud storage than the existing system.
    VL  - 5
    IS  - 3
    ER  - 

    Copy | Download

Author Information
  • Department of Computer Science, Akwa Ibom State University, Ikot Akpaden, Nigeria

  • Department of Computer Science, Abia State University, Uturu, Nigeria

  • Department of Computer Science, Akwa Ibom State University, Ikot Akpaden, Nigeria

  • Department of Computer Science, Akwa Ibom State University, Ikot Akpaden, Nigeria

  • Sections